Match with definition active attack adversary asset attack computer security cou
ID: 3919707 • Letter: M
Question
Match with definition
active attack
adversary
asset
attack
computer security
countermeasure
passive attack
threat
vulnerability
An unauthorized attempt to gain information from a system (such as by eavesdropping) without affecting the system’s operation.
Anything that an owner considers valuable.
An action taken to prevent or minimize the damage of a potential attack.
An unauthorized attempt to modify some aspect of a system’s operation.
A threat carried out.
A real or hypothetical entity that attacks or is a threat to a system.
A flaw or weakness in a system’s design, implementation, operation or management that could be exploited to violate the system’s security policy.
The protection of the integrity, availability, and confidentiality of information system resources.
A potential for violation of security.
a.An unauthorized attempt to gain information from a system (such as by eavesdropping) without affecting the system’s operation.
b.Anything that an owner considers valuable.
c.An action taken to prevent or minimize the damage of a potential attack.
d.An unauthorized attempt to modify some aspect of a system’s operation.
e.A threat carried out.
f.A real or hypothetical entity that attacks or is a threat to a system.
g.A flaw or weakness in a system’s design, implementation, operation or management that could be exploited to violate the system’s security policy.
h.The protection of the integrity, availability, and confidentiality of information system resources.
i.A potential for violation of security.
Explanation / Answer
Answer:------------
An unauthorized attempt to gain information from a system (such as by eavesdropping) without affecting the system’s operation. ===>>> passive attack
Anything that an owner considers valuable. ===> asset
An action taken to prevent or minimize the damage of a potential attack. ==>> countermeasure
An unauthorized attempt to modify some aspect of a system’s operation. ==> active attack
A threat carried out. ==>> attack
A real or hypothetical entity that attacks or is a threat to a system. ==>>adversary?
A flaw or weakness in a system’s design, implementation, operation or management that could be exploited to violate the system’s security policy. ===> vulnerability
The protection of the integrity, availability, and confidentiality of information system resources. ==>> computer security
A potential for violation of security. ==> threat
a.An unauthorized attempt to gain information from a system (such as by eavesdropping) without affecting the system’s operation. ===>>> passive attack
b.Anything that an owner considers valuable. ===> asset
c.An action taken to prevent or minimize the damage of a potential attack. ==>> countermeasure
d.An unauthorized attempt to modify some aspect of a system’s operation. ==> active attack
e.A threat carried out. ==>> attack
f.A real or hypothetical entity that attacks or is a threat to a system. ==>>adversary?
g.A flaw or weakness in a system’s design, implementation, operation or management that could be exploited to violate the system’s security policy. ===> vulnerability
h.The protection of the integrity, availability, and confidentiality of information system resources. ==>> computer security
i.A potential for violation of security. ==> threat